problem 2) _____________ Viruses which aim at a boot sector of hard drive are infecting a very crucial component of the boot process:

a) File infection virusb) Boot virusc) Network virusd) E-mail virus

problem 3) ____________is a virus that they would attach themselves to EXE files, compressed files like ZIP files and driver files:

a) File infector virusb) Boot virusc) Network virusd) E-mail virus

problem 4)__________ is a virus, that is uniquely created to quickly spread throughout local area network

a) File infector virusb) Boot virusc) Network virusd) E-mail virus

problem 5) Which of the following are the main purposes of the operating system

a) To provide the environment for computer user to execute programs on computer hardware in a convenient and efficient mannerb) To allocate separate resources of the computer as needed to solve the problem givenc) Supervision of the executions of user programs to prevent errors and improper use of computerd) All of the above

Related Questions in Computer Engineering

Hot Foot Shoes would like to maintain its cash account at a minimum level of $44,000, but expects the standard deviation in net daily cash flows to be $5,900, the effective annual rate on marketable securities to be 5.6 ...

Suppose we construct the basic family of six locality-sensitive functions for vectors of length six. For each pair of the vectors 000000, 110011, 010101, and 011100, which of the six functions makes them candidates?

A TCP segment consisting of 1500 bits of data and 160 bits of header is sent to the IP layer, which appends another 160 bits of header. This is then transmitted through two networks, each of which uses a 24-bit packet he ...

The type of support and traffic can be the factors when selecting a WAN service provider... Would reliability an important factor? Would security (such as data integrity) an important factor? Please explain

Suppose you have ten squares of stained glass, all of different colors, and you would like to make a rectangular stained glass window in the shape of a 2 × 5 grid. How many different ways can you do this, taking symmetry ...

Two divers start at the surface and establish the following coordinate system: x is to the west, y is to the north, and z is down. Diver 1 swims 60 ft east, then 25 ft south, and then dives 30 ft. At the same time, diver ...

a. What entity type should come to mind when you see the words "For use by" in a form? b. Give examples of 1:1, 1:N, and N:M recursive relationships (other than those presented in this chapter). c. Explain why the data m ...

Introduction to Computing Research at least three different executive support systems using a web search. Review each, and then answer the following questions: 1. Which ESSs did you review? Include a link to information ...

4,153,160 Questions Asked

13,132 Experts

2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses,
Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.